Author:
Vázquez-Ingelmo A.,Moreno-Montero Á. M.,García-Peñalvo F. J.
Publisher
Springer International Publishing
Reference56 articles.
1. Ko, H., Mesicek, L., Choi, J., Choi, J., & Hwang, S. (2018). A study on secure contents strategies for applications with DRM on cloud computing. International Journal of Cloud Applications, 8(1), 143–153.
2. Tewari, A., & Gupta, B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
https://doi.org/10.1016/ j.future.2018.04.027
3. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global.
4. Gupta, B. B. (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. Boca Raton: CRC Press.
5. Welsh, C. (2013). GNS3 network simulation guide. Birmingham: Packt.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献